 |
|
|
 iPhone User Interface Cookbook
The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to
a new "App" economy, with developers racing to the platform. Mobile touch-centric interfaces
vary greatly from traditional computing platforms, and programmers as well as designers must
learn to adapt to the new form-factor.
... |  |  Machine Learning for Hackers
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract insight
from a record of the... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 181 180 179 178 177 176 175 174 173 172 171 170 169 |